Navigation X

Sektor7 - Malware Development Intermediate Course

Posted by Sauron posted at


Sektor7 - Malware Development Intermediate Course  774
Sauron Moderator
1,168
Posts
1,155
Threads
Moderator
#1
[Image: Screenshot-4.png]Welcome to Malware Development Intermediate course!In our previous Essentials course we discussed basic steps to create a custom dropper.

This course builds on what you have learned so far by extending your development capabilities with:
  • playing with Process Environment Blocks and implementing our own function address resolution
  • more advanced code injection techniques
  • understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
  • in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
  • grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
  • discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
COURSE IN A NUTSHELLYou Will Learn
  • What is PEB and how function address resolution works
  • What are other code injection techniques
  • How to build custom reflective binary
  • How to hook APIs in memory
  • How to migrate between 32- and 64-bit processes
  • How to use IPC to control your payloads
What Will You Get?
  • Full-blown videos explaining all techniques in detail
  • Transcription with English subtitles
  • Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
  • Source code with code templates for rapid development
  • VM image with ready-to-use development environment
Requirements
  • Recommended: taking Malware Development Essentials course
  • Understanding of operating system architecture
  • Some experience with Windows OS
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 7.0+ installed
  • Strong will to learn and having fun
 
Target Audience
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics


Hidden Content
You must register or login to view this content.

Reply
del1ja500 Member
30
Posts
0
Threads
Member
#2
thanks man, very good resource!
Reply
fatsmatrat Junior Member
3
Posts
0
Threads
Junior Member
#3
thanks
Reply
xali1996 Member
12
Posts
0
Threads
Member
#4
appreciate it man
Reply

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)